Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining

Namhi KANG  Christoph RULAND  

IEICE TRANSACTIONS on Communications   Vol.E88-B   No.3   pp.1264-1265
Publication Date: 2005/03/01
Online ISSN: 
DOI: 10.1093/ietcom/e88-b.3.1264
Print ISSN: 0916-8516
Type of Manuscript: LETTER
Category: Internet
stream authentication schemes,  hash chaining,  denial of service(DoS) attack,  

Full Text: PDF(72.2KB)>>
Buy this Article

In this letter, we show that some stream authentication schemes using hash chaining are highly vulnerable to denial of service (DoS) attacks. An adversary can disrupt all receivers of group by making use of modifying a few packets in those schemes.